Close Menu
    Facebook X (Twitter) Instagram
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Facebook X (Twitter) Instagram
    Deep Tech Ledger
    • Home
    • Crypto News
      • Bitcoin
      • Ethereum
      • Altcoins
      • Blockchain
      • DeFi
    • AI News
    • Stock News
    • Learn
      • AI for Beginners
      • AI Tips
      • Make Money with AI
    • Reviews
    • Tools
      • Best AI Tools
      • Crypto Market Cap List
      • Stock Market Overview
      • Market Heatmap
    • Contact
    Deep Tech Ledger
    Home»Crypto News»DeFi»North Korean Cyber Spies Are No Longer Just Remote Threats
    North Korean Cyber Spies Are No Longer Just Remote Threats
    DeFi

    North Korean Cyber Spies Are No Longer Just Remote Threats

    April 9, 20265 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    ledger


    This month’s $285 million exploit on Drift, a decentralized exchange (DEX), was the largest crypto hack in over a year, when exchange Bybit lost $1.4 billion. North Korean state-backed hackers were named as prime suspects in both attacks.

    This past autumn, attackers posed as a quantitative trading firm and approached Drift’s protocol team in person at a major crypto conference, said Drift in an X post Sunday.

    “It is now understood that this appears to be a targeted approach, where individuals from this group continued to deliberately seek out and engage specific Drift contributors, in person, at multiple major industry conferences in multiple countries over the following six months,” said the DEX.

    Until now, North Korean cyber spies have targeted crypto firms online, through virtual calls and remote work. An in-person approach at a conference would not typically raise suspicion, but the Drift exploit should be enough for attendees to review connections made at recent events.

    bybit
    The hack cut Drift’s TVL by more than half in about 12 minutes. Source: DefiLlama

    North Korea expands crypto playbook beyond hacks

    Blockchain forensics firm TRM Labs described the incident as the largest DeFi hack of 2026 (so far) and the second-largest exploit in Solana’s history, just behind the $326 million Wormhole bridge hack in 2022.

    The initial contact dates back about six months, but the exploit itself traces to mid-March, according to TRM. The attacker began by moving funds from Tornado Cash and deploying the CarbonVote Token (CVT), while using social engineering to persuade multisig signers to approve transactions that granted elevated permissions.

    They then manufactured credibility for CVT by minting a large supply and inflating trading activity to simulate real demand. Drift’s oracles picked up the signal and treated the token as a legitimate asset.

    When the pre-approved transactions were executed on April 1, CVT was accepted as collateral, withdrawal limits were increased and funds were withdrawn in real assets, including USDC.

    TRM outlines funds moving from Tornado Cash in March used to prepare for the Drift exploit. Source: TRM Labs

    Related: North Korean spy slips up, reveals ties in fake job interview

    According to TRM, the speed and aggressiveness of the subsequent laundering exceeded that seen in the Bybit hack.

    North Korea is widely believed to be using large-scale crypto thefts such as the Drift and Bybit attacks alongside longer-term tactics, including placing operatives in remote roles at tech and crypto firms to generate steady income. The United Nations Security Council has said such funds are used to support the country’s weapons program.

    Security researcher Taylor Monahan said infiltration of DeFi protocols dates back to “DeFi summer,” adding that around 40 protocols have had contact with suspected DPRK operatives.

    North Korean state media reported Thursday that the country tested an electromagnetic weapon and a short-range ballistic missile, known as the Hwasong-11, fitted with cluster munition warheads.

    Estimated dimensions for the KN-23, also known as the Hwasong-11A. Source: Christian Maire, FRS

    Infiltration network fuels steady crypto revenue

    A separate investigation revealed how a network of North Korea-linked IT workers generated millions through prolonged infiltration.

    Data obtained from an anonymous source shared by ZachXBT showed the network posing as developers and embedding themselves across crypto and tech firms, generating roughly $1 million a month and more than $3.5 million since November.

    The group secured jobs using falsified identities, routed payments through a shared system, then converted funds to fiat and sent them to Chinese bank accounts via platforms such as Payoneer.

    Wallet tracing linked part of the flow to addresses tied to known DPRK activity, the blockchain sleuth said. Source: ZachXBT

    Related: Are you a freelancer? North Korean spies may be using you

    The operation relied on basic infrastructure, including a shared website with a common password and internal leaderboards tracking earnings. 

    The agents applied for roles in plain sight using VPNs and fabricated documents, pointing to a longer-term strategy of embedding operatives to extract steady revenue.

    Defenses evolve as infiltration tactics spread

    Cointelegraph encountered a similar scheme in a 2025 investigation led by Heiner García, who spent months in contact with a suspected operative.

    Cointelegraph later took part in García’s dummy interview with a suspect who went by “Motoki,” who claimed to be Japanese. The suspect rage quit the call after failing to introduce himself in his supposed native dialect.

    The investigation found operatives bypassed geographic restrictions by using remote access to devices physically located in countries such as the US. Instead of VPNs, they operated those machines directly, making their activity appear local.

    By now, tech headhunters have realized that the person at the other end of a virtual job interview may indeed be a North Korean cyber spy. A viral defence strategy is to ask suspects to insult Kim Jong Un. So far, the tactic has been effective.

    A suspected North Korean IT worker freezes when asked to call Kim Jong Un a “fat, ugly pig.” Source: Tanuki42

    However, as Drift was approached in person and García’s findings showed operatives finding creative methods to bypass geographic restrictions, North Korean actors have continued to adapt to the cat-and-mouse dynamic.

    Requesting interviewees to call North Korea’s supreme leader a “fat pig” is an effective strategy for the time being, but security researchers warn that this won’t work forever.

    Magazine: Phantom Bitcoin checks, China tracks tax on blockchain: Asia Express

    Cointelegraph Features publishes long-form journalism, analysis, and narrative reporting produced by Cointelegraph’s in-house editorial team with subject-matter expertise. All articles are edited and reviewed by Cointelegraph editors in line with our editorial standards. Research or perspective in this article does not reflect the views of Cointelegraph as a company unless explicitly stated. Content published in Features does not constitute financial, legal, or investment advice. Readers should conduct their own research and consult qualified professionals where appropriate. Cointelegraph maintains full editorial independence. The selection, commissioning, and publication of Features and Magazine content are not influenced by advertisers, partners, or commercial relationships. This content is produced in accordance with Cointelegraph’s Editorial Policy.



    Source link

    10web
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    CryptoExpert
    • Website

    I’m someone who’s deeply curious about crypto and artificial intelligence. I created this site to share what I’m learning, break down complex ideas, and keep people updated on what’s happening in crypto and AI—without the unnecessary hype.

    Related Posts

    North Korean Hackers Infiltrated Crypto For Seven Years

    April 8, 2026

    Polymarket Grabs 97% of Onchain Prediction Market Fees After Overhaul

    April 7, 2026

    Chaos Labs Leaves Aave Due to Budget, Risk Disagreements

    April 7, 2026

    Perp DEX Trading Cools as Volumes Slides For Five Straight Months

    April 6, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    quillbot
    Latest Posts

    The Only Stock I’d Hold in a TFSA for Life

    April 9, 2026

    Sixteen new START.nano companies are developing hard-tech solutions with the support of MIT.nano | MIT News

    April 9, 2026

    US Iran Ceasefire Boosts Bitcoin, Stocks: Will It Hold?

    April 9, 2026

    The Best Claude AI Business Ideas For Beginners

    April 8, 2026

    Price Prediction for SPX, DXY, BTC, ETH, BNB, XRP, SOL, DOGE, HYPE, ADA

    April 8, 2026
    ledger
    LEGAL INFORMATION
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Top Insights

    Bitcoin on-chain activity is a ghost town with price being controlled by corporate products

    April 9, 2026

    The U.S. economy almost stalled, but inflation still stayed too hot for an easy Fed rescue

    April 9, 2026
    synthesia
    Facebook X (Twitter) Instagram Pinterest
    © 2026 DeepTechLedger.com - All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.